Introduction to Security Operations Center (SOC) | TryHackMe
Introduction We covered an introduction to security operations center and how it works, what are the different…
Introduction We covered an introduction to security operations center and how it works, what are the different…
Introduction We covered an introduction to Maltego for reconnaissance, information gathering and threat intelligence. We covered how…
Introduction We covered Recon-ng as a Reconnaissance framework that is used commonly by red teams during engagements….
Introduction to Splunk We covered the basic fundamentals of Splunk for beginners. We explored data collection through…
Introduction We covered investigating a cyber incident with splunk. We investigated the events generated on compromised windows…
Introduction We covered Windows fundamentals and basics such as file system, permissions, directory structure, system configuration, computer…
Introduction We covered basic foundation on internet protocols such as telnet, HTTP, FTP, IMAP, POP3, SMTP and…
Introduction We covered OPSEC which is a US military framework that can be used in the context…
Introduction We covered an introduction to C2 servers. We explained C2 agents, payloads and their types (staged…
Introduction In this post, we covered the first part of passive and active reconnaissance basics and tools….
Introduction In order to better understand what a C2 framework is at its most basic level, think…
Introduction We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe….
Introduction Microsoft’s Active Directory is the backbone of the corporate world. It simplifies the management of devices…
Summary In this post, we covered Nmap scanning commands and techniques from beginners to advanced. We explained…
Introduction We covered investigating an infected windows machine using Splunk. We investigated Windows event logs and specifically…
Introduction We used Splunk to investigate the ransomware activity on a Windows machine. The ransomware was downloaded…
Introduction We covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs…
In this post, we covered part 4 of Windows Persistence Techniques and particularly we covered scheduled tasks…
In this post, We covered the second part of the TryHackMe CTF collection Vol.1 challenge where we…
Introduction In this post, We covered most common Windows Privilege Escalation techniques as part of TryHackMe Windows…